arithmetic number 中文意思是什麼

arithmetic number 解釋
算術數
  • arithmetic : n. 1. 算術,演算法;計算。2. 算術書。
  • number : n 1 數;數字;〈pl 〉算術。2 (汽車等的)號碼;第…,第…卷,第…期〈通常略作 No (復數 Nos ),用於...
  1. 0 for an arithmetic right shift of a positive number

    進行數學左移位時,設置為0
  2. Floating - point arithmetic overflow or division by zero never throws an exception, because floating - point types are based on ieee 754 and so have provisions for representing infinity and nan not a number

    浮點算術溢出或被零除從不引發異常,因為浮點類型基於ieee 754 ,因此可以表示無窮和nan (不是數字) 。
  3. Loop a number of times but only makes minimal use of integer arithmetic

    要循環多次(但是僅利用了最少的整數運算) 。
  4. This standard allows one ' s complement, two ' s complement, or sign - magnitude number representations and arithmetic. arithmetic zero is represented as the value of a single cell with all bits clear

    這個標準允許一補數、二補數或是符號式的量值和算術.算術零是以一個單一單元數值的所有位元都被清除來表示
  5. In the process for doing " generalization ", we make use of the higher arithmetic progression concepts [ 3 ] to deal with the results finally carry out the model of solving the crossing number of network graphs problems, this way may be an originality

    在進行觀察歸納研究法模式來探討管線網路設置,其交叉處個數問題類化、一般化的過程中,引進高階等差級數的理論3來處理所得結果的一般解決模式,乃是一種創意。
  6. This article details the arrangement relationship of independence, order, deflection order and the waterfall arrangement ways according to path number and running time, with the stress on the " trapezoid " arithmetic of batch process in parallel computer

    摘要介紹了含有獨立、順序、有偏序關系的批作業的梳理,以及批作業按作業序列路徑數、運行時間長短排序的瀑布式方法,重點講述了并行機批作業執行時的「梯形」演算法。
  7. In this paper, the author primarily introduces how elliptic curves have been applied to public key cryptography from algebra and number theory, analyzes the advantage and security of ecc. the work the author has done is : ( 1 ) study the arithmetic of ecc on the encryption / decryption, digital signature and key exchange schemes and analyze their security performance ; ( 2 ) propose a new id - based group signature with existed id - based digital signature and discuss its application in digital cash ; ( 3 ) realize the electronic auction system and key authentication system with ecc

    作者所作的主要工作有: ( 1 )研究了基於大素數域上的橢圓曲線密碼在加密解密、密鑰交換、數字簽名等方面的密碼協議並分析了每種協議的安全性能; ( 2 )在現有基於身份的數字簽名方案的基礎上提出了基於身份的群簽名系統並討論了群簽名在數字現金中的應用; ( 3 )給出了橢圓曲線密碼在電子拍賣系統、密鑰認證系統方面的實現方案。
  8. This paper simulates the effect of voltage fluctuation inspection through the tool of matlab. and proves the filters ' s stability. in the part of self - checkout, pi ( proportional integral ) control arithmetic is put forward to check the gain k and the calculated results show the method ' s effectiveness. then many comparements toward pst are done in different realization methods such as different interpolation points classification number and sample frequency. though simulation and calculation we can see the designed flicermeter can meet our country ' s standands

    文中利用matlab對電壓波動的檢測效果進行了模擬;並對涉及到的濾波器的穩定性做了證明;在自校驗部分提出了將pi (比例、積分)演算法用於數字濾波器增益k值的確定,取得了不錯的效果;然後分別從取不同插值點、不同分級數和不同采樣頻率這幾個方面出發,對計算出的p _ ( st )值進行了比較。
  9. This traps a number of common error conditions such as syntax errors or arithmetic overflow and diverts the flow of control to a special error - handling routine youve written

    這可以為很多常見的錯誤條件(例如語法錯誤或算術上溢)設陷,並將控制流轉移到您自己編寫的一個專門的錯誤處理常式。
  10. Because it distributes interceders of different source to each node in system, lets each interceder work as controlling node in centralizing control arithmetic, it has message number of centralizing control arithmetic and load equilibrium of distributed arithmetic. characteristic of auto - transfer brings dependability of distributed arithmetic, because while a node has down, other nodes ’ requests that had been sent to it can send to other nodes by producing new interceder

    該演算法將不同鎖對象(共享資源)的仲裁者分佈到了系統中的各個節點,讓每個仲裁者都像集中式演算法中的控制者一樣的工作,因此,該演算法具有集中式演算法的消息量和分散式演算法的負載均衡。
  11. An arithmetic operator that divides one number by another number

    將一個數除以另一個數的算術運算符。
  12. The author mainly realized the method of generating the large random numbers and judging the prime number using lehmann means, then three pairs of secure key with different lengths ( 256 bits, 512 bits, 1024 bits ) was generated to meet the demand of different security grade. in encryption module, modular multiplication arithmetic of large number was realized adopting addition chaining. in decryption module, extended euclid was used to get inverse, and the chinese remainder theorem was used to realize decryption, which increased the speed of decryption greatly

    作者主要實現了大隨機數的生成、採用整除小素數和勒曼測試法判定素數,可以生成三種不同長度的密鑰對( 256位、 512位、 1024位)來滿足不同的加密安全等級的需求;加密模塊中,選用了二進制序列的乘法方法,實現了大數模冪乘運算;解密模塊中,引用了擴展的歐幾里德法求逆元,並採用中國剩餘定理實現解密過程,大大提高了解密速度。
  13. The comprehensive ranking of a site or entity depends on the arithmetic mean value of the following parameters : visit rate, average number of days a cyber user visits the site or entity, non - repetitive pages opened and total number of pages opened, average time and number of times a cyber user visits the site or entity

    某網站或實體的整體排名是由以下指標的算術平均值決定的:到達率平均每個網民訪問該網站或實體的天數打開的不重復頁面和整體頁面展開數平均每個網民訪問該網站或實體的時間和訪問次數。
  14. Dividing a floating - point value by zero results in either positive infinity, negative infinity, or not a number, according to the rules of ieee arithmetic

    根據ieee演算法的規則,將浮點值除以零會產生正無窮、負無窮或「不是數字」 ( nan ) 。
  15. In the aspect of the selection of fuzzy probability of bottom event, the concept of the basic condition in the priority of selecting the fuzzy number model is brought forward, and traits of the fuzzy number model is analyzed and compared. the reason that the accurate probability is replaced with the probability of linear fuzzy number is elucidated. and the definition and arithmetic of the logic gate fuzzy arithmetic operators is established

    在模糊故障樹分析法選擇底事件模糊概率方面,本文提出了優先選擇模糊數模型的基本條件的概念,分析比較了各種模糊數模型的特點,闡明運用線性模糊數概率取代精確的概率值的理由,並根據模糊數( f數)及其運算規則,導出邏輯門模糊運算元定義及演算法。
  16. It also contains carry input to certain integer arithmetic operations and the number of bytes to transfer during load and store string instructions,

    它還存放某些整數運算操作的進位輸入以及加載和存儲指令(
  17. It could be popularly used in signal processing, signal restoration, ultrasonic detection, image restoration, system identification. many people had made embedded researching in solution ' s number, quality, fast arithmetic, error ' s processing and made great progress in this field

    卷積和卷積反演是數字信號處理中的重要問題,它在信號處理、信號恢復、超聲診斷、圖象復原、系統辯識等領域都有廣泛的應用。
  18. Finally, considering the problem which the cipher ' s secure level is not easy to be changed in the existing elliptic curve digital signature field - arithmetic algorithms, we express a large number as the structure data type and design a field - arithmetic algorithm in elliptic curve cryptography for different cipher security

    第四是針對現廣西大學碩士學位論文一基於橢圓曲線密碼體制的多重數字簽名技術研究有的橢圓曲線密碼體制密碼域算術算潔在實現上強度不易擴展的問題,我們將大整數用結構數據類型表示,設計適合不同橢圓曲線密碼強度的域算術算潔。
  19. Two perpendicular polarized light states and a no - light state are applied to express information in the ternary optical computer. the three states are transformed via two - dimension liquid crystal element and polarizators, and ternary arithmetic operation and ternary logical calculus completed directly in this way. the ternary optical computer will possess enormously number of bit ( easy to 104 ), light processor, light transmission path and electric control system

    三值光計算機用相互垂直的兩個線偏振光和零光強三個獨立的光狀態表示信息;用二維液晶器件和偏振器實現此三個狀態間的轉換;採用三進制算術運算;直接處理三值邏輯運算;擁有巨大的數據位數(容易超過10 ~ 4位) ;具有光運算、光傳送、電控制等結構特色,具有很強的空間、時間并行性。
  20. Then, using recursive arithmetic calculated reliability indices for directory tree, the method was realized by vb program ; the other is a method of reliability evaluation by interval arithmetic, which is the use of interval arithmetic to evaluate reliability, and the computation theory is also given. during the calculation, interval number replaced the component " s parameter and it takes into consideration the uncertainty of all of the parameters. in the study of power distribution system configuration, a new configuration model is set up which takes into account simultaneously the losses minimization and system reliability, then improved genetic arithmetic is described detail and of advantage for solving this problem

    在配電網可靠性評估的研究中,提出了兩種實用的配電網可靠性評估方法:其一是利用網路分層和遞歸演算法理論,使用高級語言進行程序設計,提出了一種基於vb編程的配電網可靠性評估方法,該方法通過程序實現了網路拓撲結構的分層等效和可靠性指標的遞歸計算,使整個計算過程得到了簡化,並且界面窗口的可視化,使得評估過程便捷、形象;其二是提出了一種基於區間演算法的配電網可靠性評估方法,該方法是一種利用區間理論計算配電系統可靠性的不確定性評估方法;文章給出了區間運算的原理;討論了配電系統中區間數據的來源途徑,並用區間數代替元件的可靠性參數,對輻射形配電網進行了可靠性評估。
分享友人